Apple's iPhones are the bane of Gamma Groups' existence, according to leaked documents which say the devices are near impossible to spy upon -- unless jailbroken.
Staying on top of the latest in software/hardware security research, vulnerabilities, threats and computer attacks.
Violet Blue is the author of The Smart Girl's Guide to Privacy. She contributes to ZDNet, CNET, CBS News, and SF Appeal.
Larry Seltzer has long been a recognized expert in technology, with a focus on mobile technology and security in recent years
Security worries raised by an automatically-activating cloud service on Xiaomi's handsets have now been quelled by the addition of opt-out features.
America's biggest hacker conference is setting a new record for attendance at its 22nd annual event, at the Rio, Las Vegas, Nevada -- and its vendors reflect the event's growth.
[UPDATED] Users will be required to provide a full name and ID and to identify hardware.
The major software companies are rebelling against the established standards for revocation checking. Some new standards and some vendor hacks are replacing our current, broken system.
Bitcoin exchanges and trading posts have been hacking targets over the past year, but now one hacker has taken on ISPs to loot Bitcoin from mining pools.
At Black Hat USA 2014, Yahoo's CISO announced in a presentation that consumers will be seeing end-to-end encryption in its Mail product by 2015.
Leading security conference Black Hat showcased its 2014 USA vendors and sponsors in its sprawling new location at Mandalay Bay, Las Vegas, Nevada.
Next Tuesday Microsoft will release nine updates to Windows, Internet Explorer, the .NET Framework, SQL Server and Office. Two updates to Windows and IE are critical.
It's a good thing that IE will warn you before running outdated versions of important ActiveX controls, but it's such a small thing compared to what Microsoft could do.